Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,554,357 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Ensuring Software Integrity in IoT Devices
C. Echard
2017
Corpus ID: 55323687
This paper will review the available literature covering topics relevant to ensuring software integrity of the boot image and…
Expand
2014
2014
THE PREDICTIVE VALUE OF ULTRASONOGRAPHIC ASSESSMENT OF LOWER SEGMENT SCAR INTEGRITY IN PATIENT WITH PREVIOUS CAESAREAN SECTION NEAR TERM
A. Azeem
,
D. Ibrahim
,
Sheen Shazely
2014
Corpus ID: 54667498
Purpose: to determine the predictive value of trans-abdominal (TA) US in assessing thickness of lower uterine segment by…
Expand
Review
2012
Review
2012
A KNOWLEDGE BASED APPROACH FOR THE GENERALIZATION OF LINEAR FEATURES
Andriani Skopeliti
,
L. Tsoulos
2012
Corpus ID: 10509178
Andriani Skopeliti 1 Lysandros Tsoulos 2 Cartography Laboratory, Faculty of Rural and Surveying Engineering National Technical…
Expand
2011
2011
Dymo: Tracking Dynamic Code Identity
Bob Gilbert
,
R. Kemmerer
,
Christopher Krügel
,
Giovanni Vigna
International Symposium on Recent Advances in…
2011
Corpus ID: 5294205
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive…
Expand
2010
2010
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation
Raghunathan Srinivasan
,
P. Dasgupta
,
Tushar Gohad
,
A. Bhattacharya
International Conferences on Information Science…
2010
Corpus ID: 17241803
Integrity of computing platforms is paramount. A platform is as secure as the applications executing on it. All applications are…
Expand
2008
2008
Mechanisms to Provide Integrity in SCADA and PCS devices ∗
Aakash Shah
,
A. Perrig
,
B. Sinopoli
2008
Corpus ID: 14485275
Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure such as natura l gas, oil…
Expand
2007
2007
Microarchitectural Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors
Yunsi Fei
,
Z. Shi
Design, Automation & Test in Europe Conference…
2007
Corpus ID: 334260
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At…
Expand
2006
2006
Data and code integrity in Grid environments
R. Akimana
,
Olivier Markowitch
2006
Corpus ID: 13953596
In a large distributed system such as the Grid, ensuring data integrity is of particular importance. Since in a same network…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
1991
1991
Algorithm- sequenced access control
J. Domingo-Ferrer
Computers & security
1991
Corpus ID: 14077512
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE